Wednesday, August 08, 2007

Help shape digital reputations at Data Sharing Summit

Network World

Identity Management




Network World's Identity Management Newsletter, 08/08/07

Help shape digital reputations at Data Sharing Summit

By Dave Kearns

A bit over a year ago I wrote in a newsletter that social networking is rapidly becoming the testing laboratory for Internet technologies and identity management is no different - what's important from an identity management perspective in today's social networks will become important tomorrow in our business networks. I was talking about reputation (and, by extension, opinion) as an asset of an entity’s identity. Reputation has, in fact, been a facet of identity for quite a long time. One of the main reasons for trademark laws is to protect the reputation of a brand or company. It doesn’t just protect against someone trying to sell “Coca Coia” (with the distinctive script logo) as a cola beverage, but also protects against them selling, say, “Coca Coia Orange Juice.” The infringer hopes you will confuse the identity of their product and attach Coca-Cola’s reputation to it. But reputation can cut both ways.

Early next month (Sept. 7 and 8) there’ll be a “Data Sharing Summit” held in the San Francisco Bay Area to: “get a number of the key players, developers and platforms in the social networking, blogging and associated 'social software' platforms together in one room and hash out a bunch of key issues.”

One of those issues is that of data portability – being able to easily move your likes and dislikes, your friends and relationships, your pictures, music, what have you, from one social network to another. And there’s where the problem crops up.

Network World Security Buyers Guide

Find the right security products for your enterprise - fast. From anti-spam to wireless LAN security, our Buyers Guides have detailed information on hundreds of products in more than 20 categories. With the side-by-side comparison tool you can evaluate product features to make the best decision for your enterprise.

Click here to go to the Security Buyers Guide now.

The actual “move things around” protocols and schemas should be easy; it’s making sure the people are comfortable with it that’s the problem. As I’ve often said, the technology of identity management is easy; it’s the people (the politics, the business logic, etc.) that’s the hard part.

Companies are, more and more, mining the data on social networks to discover information about potential new employees. See the recent Newsday story “Our digital pasts won't leave us alone”, for example. There’s a whole new industry growing up of companies that will find inaccurate or embarrassing data about you and, for a fee, get it removed – or buried far down on Google search results pages. And that’s just about embarrassing things that you, yourself put on the Web.

What happens when the “friend” (actually someone you barely know) on Facebook up and migrates all of his data and relationships to “Kinky Kitties”? What happens when an ambitious prosecutor subpoenas Kinky Kitties’s servers and compiles lists of everyone mentioned, then calls them in for questioning – or brings them before a grand jury? Sure, you most likely won’t be charged with a crime, but will your boss (or your spouse or your real friends) really understand? Will your reputation suffer?

Reputation as a digital identity attribute will be built on social networks. If you don’t get involved now, you may be too late to shape its use later on. The Data Sharing Summit, next month in Richmond, Calif., might be where you should become involved.

Editor's Note: Starting Aug. 13, this newsletter will be renamed "Security: Identity Management" to better reflect the focus of the newsletter. We thank you for reading Network World newsletters!

[Starting Monday some of the readers of this newsletter will begin receiving a redesigned version that we will be testing over the next few weeks. The redesign allows us to better integrate the convenience of e-mail newsletters with the immediacy of Network World online. The regular features will remain the same, the difference is that you'll be able to view Dave Kearns's column, plus the rest of the content, in full online at NetworldWorld.com. We hope you enjoy the redesign. Please let us know what you think.]


  What do you think?
Post a comment on this newsletter

TODAY'S MOST-READ STORIES:

1. Kittens could solve spam
2. 802.11n WLAN tests show 'unbelievable' results
3. Cisco founder unveils the Next Big Thing?
4. 'Net pioneer Roberts touts 'Fast Flow Routing'
5. Undercover TV producer booted from DefCon
6. Do Not Call Registry gets wake-up call
7. Cisco founder brings optics to the router guys
8. The rise of the sensitive spammer
9. Newspaper outs ‘Fake Steve Jobs’
10. Mozilla: 10 day patch guarantee 'not our policy'

MOST-READ REWVIEW:
NAC alternatives hit the mark


Contact the author:

Dave Kearns is a writer and consultant in Silicon Valley. He's written a number of books including the (sadly) now out of print "Peter Norton's Complete Guide to Networks." His musings can be found at Virtual Quill.

Kearns is the author of two Network World Newsletters: Windows Networking Strategies, and Identity Management. Comments about these newsletters should be sent to him at these respective addresses: windows@vquill.com, identity@vquill.com .

Kearns provides content services to network vendors: books, manuals, white papers, lectures and seminars, marketing, technical marketing and support documents. Virtual Quill provides "words to sell by..." Find out more by e-mail.



ARCHIVE

Archive of the Identity Management Newsletter.


BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments:

Post a Comment